"A lot of what makes an organization secure is what happens between an individual and their keyboard or their phone"

Published at 1:42 PM EDT on Apr 9, 2018

Receive the latest tech updates in your inbox

Ohio State University sophomore Ezequiel Herrera looks up an old email about cybersecurity and phishing during an interview on campus, Friday, March 30, 2018 in Columbus.

Thousands of university students and employees targeted by email phishing schemes this year have taken the bait. Fortunately, they were duped not by real scammers, but by their own schools — in simulations meant to make them more adept at spotting real threats.

When Ohio State University did its first student-focused phishing in January — a strategy also used in the corporate world — over 18 percent of the recipients clicked through. The University of Alabama at Birmingham's employee-focused phishing awareness campaign snagged over 7,000 people in March, or about a quarter of the recipients.

Ohio State sophomore Ezequiel Herrera, who prides himself on quickly responding to messages, was caught off guard twice by the fake phishing emails. The first time, he said, he felt proud his school was taking that kind of educational action. The second time left him frustrated.

"I was sort of like, 'Wow, I'm really, really bad,'" Herrera, 19, said with a smile. Since then, he said, he has become more cautious while scrolling through emails from unfamiliar senders.

How to Protect Yourself From Hackers

Thursday's news that Yahoo suffered a hack of 500 million of its user accounts may have many people taking a new look at how to keep their own email accounts and personal information secure. One easy way to protect yourself from hackers is by regularly updating your software. "Hackers are always finding new vulnerabilities to exploit," said Consumer Reports Editor Jerry Beilinson.

(Published Friday, Sept. 23, 2016)

The faux phishing messages mimic emails about financial aid, holidays, resetting passwords or other topics but contain signs of potential fraud, such as generic greetings, requests for urgent action or information, spelling errors, and senders from unfamiliar domain names. Recipients who click links in the emails are redirected to tips about good cybersecurity habits and how to spot and report real attempts at stealing passwords or other sensitive information.

"A phishing simulation helps people understand the role that they play in managing security — that it's not up to their IT support or the help desk or whoever that they can sort of blindly walk along," said Helen Patton, Ohio State's chief information security officer. "A lot of what makes an organization secure is what happens between an individual and their keyboard or their phone."

Patton talks about it like a digital vaccination, helping protect individuals and the broader campus community against cyberattacks that could cost far more than the phishing simulations.

Just last month, U.S. prosecutors accused a group of Iranians of hacking the computer systems of about 320 universities in the U.S. and abroad to steal billions of dollars' worth of science and engineering research that was then used by the government or sold for profit. Prosecutors said spear-phishing emails were used to target over 100,000 professors, but they didn't publicly identify those individuals or their schools.

Ohio State has used phishing simulations for employees since 2016. Officials won't disclose exact results for security reasons but say responses have improved since the early rounds when, for example, a message about a second-floor printer was clicked by people in facilities that didn't even have a second floor.

In a hurried, tech-reliant culture in which so many people exchange so much information at their fingertips on smartphones and other devices, Patton said, the battle is getting people to slow down.

The practical, experiential training of fake phishing has proved more effective compared than slideshows, webinars or other common types of training that can get stale, said Joanna Grama, who directs the cybersecurity program at the higher education technology association EDUCAUSE.

The risk, of course, is that folks will feel tricked, so it's important that the training be educational, not punitive, Grama said.

At Alabama-Birmingham, one faculty member decried the phishing simulation as a waste of time, but most responses were positive, said Curt Carver, the university's vice president for information technology, who recalls first hearing about the concept of self-phishing over a decade ago.

Some people report the messages as suspicious, and others send replies like "Ha, you got me!" or "Didn't get me this time!" A few, he said, expressed interest in making it more of a game, wanting to gauge how well they detect phishing attacks compared with others.

"They've realized ... they can be a hero, they can be a person that helps protect everybody else," Carver said.